Want to know more about CyberHive Trusted Cloud?

Book a Demo

Cyber-security professionals must rethink their counter-attack

It’s hardly surprising that IT security has become a high priority for organisations.

The Bank of England has revealed that cyber-attacks were the joint second most cited risk to the stability of the UK financial system with cyber-attacks increasing to a record high of 62 percent¹.

Most cyber-attacks originate from human errors within an organisation, such as an employee opening a malware-laden phishing email, or as the result of some deceptive social engineering on the part of the attacker to infiltrate malicious code inside the defences.

Most standard cyber-defences, such as firewalls and penetration testing, serve to secure the systems from external attack. Anti-virus is used by most companies, but its effectiveness is minimal in the defence against the increasingly sophisticated and bespoke cyber-attacks that can go undetected for months.

Security professionals need to change their mindset to counter these disastrous attacks. They need to carefully explore the options that can safeguard a company from damage caused by human error.

IBM’s 2017 Cost of Data Breach Study: United Kingdom² revealed it took an average of 168 days to identify a data breach and 67 days to contain it.

New technologies can detect malware before it does any damage. If the mean time to identify malware (MTTI) is less than 100 days, the average cost to identify the data breach was £1.98 million. However, if it’s greater than 100 days, the cost rises to £2.97 million.

Reducing the response time and containing a breach must become a critical priority. The rising costs of data breaches are only set to increase with GDPR in place, not to mention the severe reputational damage.

CyberHive’s Trusted Cloud is the new standard in cyber-security. This combination of hardware-based cryptography and whitelisting technology protects servers from all unauthorised activity and malware in a way that conventional solutions simply can’t match.
Designed specifically for banks, financial institutions and governments, this cloud-based solution is the only of its kind to employ the Intel Trusted Platform Module (TPM) chip which is already installed on server motherboards. The chip is a dedicated microcontroller, impervious to hacking and designed to secure hardware through integrated cryptographic keys.

Existing solutions such as Trusted Cloud are vital to financial organisations that are targeted on a daily basis as the sophistication levels of hackers continues to rise. It’s critical that banks and financial service businesses know about the breach in a matter of minutes or hours, not days.

Sources:
¹ https://www.bankofengland.co.uk/systemic-risk-survey/2018/2018-h1
² 2017 Cost of Data Breach Study: United Kingdom by IBM Security and Ponemon Institute (June 2017).

Categories

Other Insight Articles

  • Law firms relying on conservative cyber security put themselves in jeopardy

    Law firms have had £11 million of client money stolen from them by hackers according to the UK’s National Cyber Security Centre, which has caused alarm bells to ring up and down the country. Unfort...

    Find out more
  • How you can prevent your business from becoming the weakest link in supply chain cybersecurity

    This year’s Accenture Cyber Threatscape Report highlights how the supply chain is now the target of choice for hackers seeking entry to the systems of major firms and organisations. The challenge f...

    Find out more
  • CyberHive to expand unique security technology into Microsoft Azure stack with Innovate UK funding for three-year collaboration with University of Oxford

    Newbury UK, 26th September, 2018: CyberHive, a leading British cyber-security vendor, has received substantial funding from Innovate UK to fuel further development of its revolutionary Trusted Clou...

    Find out more
logo

Great feedback from clients about their #CyberSWOT - @TValleyChamber members, be sure to book your complimentary session. #MakingITSecure #CyberSecurity

Contact Us

Please fill in the details below to get a 2 week demo of
CyberHive's cloud platform technology